
Cyber Security Best Practices
Posted by SGCS Admin, 28-09-2017When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is ...

Exploring the Intersection of Business Intelligence and Data Security
Posted by SGCS Admin, 27-09-2017Business intelligence strategy has ushered in a new era for organizations the world over. A strong focus on data analysis has business leaders enjoying reduced costs, increased efficiency, and all-aro...

Machine learning in cybersecurity: How to evaluate offerings
Posted by SGCS Admin, 27-09-2017Is machine learning a must-have for security analytics or is it window dressing that is irrelevant to a security manager's purchasing decision? The answer, much like the outputs derived through machin...

U.S. asks China not to enforce cyber security law
Posted by SGCS Admin, 27-09-2017GENEVA (Reuters) - The United States has asked China not to implement its new cyber security law over concerns it could damage global trade in services, a U.S. document published by the World Trade Or...

Deloitte Says 'Very Few' Clients Impacted by Cyber Attack
Posted by SGCS Admin, 26-09-2017Global accountancy firm Deloitte said on Monday it had reviewed its systems following a cyber attack which it said had affected a small number of its clients. A spokeswoman said "only very fe...

All of us are sitting on a ticking time bomb called the internet
Posted by SGCS Admin, 26-09-2017NEW DELHI: Not far from Mumbai, terror struck on June 27. Unlike 26/11, the terror attack at the Taj Palace six years ago, neither gunshots nor bomb blasts were heard. Nor were terror-struck people se...